SYSTEM AND METHOD FOR SHARED KEY AGREEMENT OVER UNTRUSTED COMMUNICATION CHANNELS
    11.
    发明公开
    SYSTEM AND METHOD FOR SHARED KEY AGREEMENT OVER UNTRUSTED COMMUNICATION CHANNELS 审中-公开
    系统和方法的共享密钥协定第不确定沟通渠道

    公开(公告)号:EP3180887A1

    公开(公告)日:2017-06-21

    申请号:EP15749769.4

    申请日:2015-08-04

    申请人: Robert Bosch GmbH

    IPC分类号: H04L9/32 H04L9/08

    摘要: A method of generating cryptographic keys includes generating, with a first processor in a first computing device, error correction data corresponding to first sensor data that are stored in a memory, generating a first cryptographic key with reference to a first hashed value of the first sensor data, generating a first message authentication code (MAC) with reference to the first cryptographic key and the error correction data, and transmitting with a first I/O device in the first computing device the error correction data and the first MAC through a communication channel to a second computing device. The transmitted data enable the second computing device to generate a second cryptographic key with reference to second sensor data.

    摘要翻译: 生成加密密钥的方法,包括生成与在第一计算设备的第一处理器,对应于第一sensorData错误校正数据都被存储在存储器中,产生与参考的第一加密密钥的第一传感器的第一哈希值 数据,通过通信信道产生的第一消息认证码(MAC),参照所述第一密码密钥和纠错数据,并且在所述第一计算设备与第一I / O设备传输的纠错数据和第一MAC 到第二计算设备。 反式mitted数据使能所述第二计算装置,以产生参考第二传感器数据的第二密码密钥。

    SYSTEM AND METHOD FOR DYNAMIC, NON-INTERACTIVE, AND PARALLELIZABLE SEARCHABLE SYMMETRIC ENCRYPTION
    12.
    发明公开
    SYSTEM AND METHOD FOR DYNAMIC, NON-INTERACTIVE, AND PARALLELIZABLE SEARCHABLE SYMMETRIC ENCRYPTION 审中-公开
    动态系统和方法,不是交互式的,并行的,可搜索的平衡加密

    公开(公告)号:EP3058678A1

    公开(公告)日:2016-08-24

    申请号:EP14786491.2

    申请日:2014-10-16

    申请人: Robert Bosch GmbH

    IPC分类号: H04L9/00

    摘要: A method of searching encrypted data includes generating with a client computing device a search index identifier corresponding to a search term in an encrypted search table and transmitting the search index identifier, a first single use key and a second single use key to a server. The method includes generating a set of decrypted data with the server for a set of data in an encrypted search table corresponding to the search index identifier using the first single use key to decrypt a first portion of the data and the second single use key to decrypt a second portion of the data. The method further includes identifying one or more encrypted files stored on the server that include the encrypted search term based on the decrypted data from the search table, and transmitting the encrypted files or encrypted file identifiers to the client computing device.

    PSEUDO-RANDOM GENERATION OF MATRICES FOR A COMPUTATIONAL FUZZY EXTRACTOR AND METHOD FOR AUTHENTICATION

    公开(公告)号:EP3563516A1

    公开(公告)日:2019-11-06

    申请号:EP17838043.2

    申请日:2017-12-27

    申请人: Robert Bosch GmbH

    IPC分类号: H04L9/32

    摘要: A method for authenticating a first device is disclosed. In embodiment, the method includes the steps of: receiving a helper bit string from a second device that is remote from the first device; measuring a first response bit string of a physical unclonable function of the first device with respect to a challenge bit string; subtracting the first response bit string from the helper bit string; reconstructing a random matrix using a pseudo-random number generator initialized with a seed; and decoding a result of the subtraction using the random matrix, the shared secret bit string being provided from the decoding if the helper bit string was encoded using a previously measured second response bit string that is within a threshold level of similarity to the first response bit string, the decoding outputting an error value otherwise.